{"uuid": "c4f44c0f-d8d6-4142-94c6-4970fd10a1e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0327", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4227", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0327\n\ud83d\udd25 CVSS Score: 7.7 (CVSS_V3)\n\ud83d\udd39 Description: CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit\ntrail data and the other acting as server managing client request) that could cause a loss of Confidentiality,\nIntegrity and Availability of engineering workstation when an attacker with standard privilege modifies the\nexecutable path of the windows services. To be exploited, services need to be restarted.\n\ud83d\udccf Published: 2025-02-13T09:31:26Z\n\ud83d\udccf Modified: 2025-02-13T09:31:26Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-0327\n2. https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-03&amp;p_enDocType=Security+and+Safety+Notice&amp;p_File_Name=SEVD-2025-042-03.pdf", "creation_timestamp": "2025-02-13T10:09:11.000000Z"}